OWASP Podcast News
OWASP NEWS October 2009
- 1 OWASP Podcast Roundtable
- 1.1 [Full-disclosure] Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack
- 1.2 Top Ten Web Hacking Techniques of 2009 (Official)
- 1.3 Google, China, "Aurora", and Advanced Persistent Threat
- 1.4 Microsoft Advances Search Privacy with Bing
- 1.5 Microsoft Seeks New Legal Framework For Cloud
- 1.6 Imperva Report on Password Practices
OWASP Podcast Roundtable
Next Recording : January 22, 2010
[Full-disclosure] Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack
Discussion: holey OS code, Batman! how do you even start to get a handle on this bugger? this isn't web app specific, but it squarely hits secure coding between the eyes. how does a bug like this survive for 17 years?
Top Ten Web Hacking Techniques of 2009 (Official)
Discussion: do you agree? anything jump out? any good back-stories?
Google, China, "Aurora", and Advanced Persistent Threat
(this makes me want to start chanting "lions and tigers and bears - OH MY!")
Google: A new approach to China
Operation “Aurora” Hit Google, Others
Hack of Google, Adobe Conducted Through Zero-Day IE Flaw
Microsoft Security Advisory (979352) Vulnerability in Internet Explorer Could Allow Remote Code Execution
Google v China
Web-based systems vs. Advanced Persistent Threat
Discussion: is this important news? how does this affect the development community, particularly by extension? has anything really changed?
Discussion: A new IE 0-day brings mega-tech-corps to their knees. France and Germany respond by recommending against the use of IE altogether. Is this news? with so many IE6 apps still in use today, does it even matter?
Discussion: this is also the source of a couple potential buzzword winners for 2010... "Operation Aurora" and "advanced persistent threat"...
Microsoft Advances Search Privacy with Bing
Discussion: is this really that big a deal? do they really need the IP address at all? is this doing enough, or does it fall far short?
Microsoft Seeks New Legal Framework For Cloud
Discussion: what sort of legislation/regulation do we need? what would be useful? we all know, I think, that's it going to happen one way or another. the question is what is and isn't useful.
Imperva Report on Password Practices
Discussion: is this surprising? Is enforced password complexity the answer? Is this the users' problem and should we care?